8/10/2022 August 10, 2022August 10, 2022 ~ The Cyber Beat Finland’s Parliament Hit With Cyberattack Following U.S. Move to Admit the Country to NATOHackers and Fraudsters Used Crypto Bridge RenBridge to Launder $540 MillionHackers Have Stolen $1.4 Billion This Year Using Crypto Bridges: Here’s WhyNew Dark Web Markets Claim Association With Criminal CartelsEx-CISA Chief Chris Krebs Calls for Us to Get Serious on SecurityCISA Releases Cybersecurity Toolkit to Protect U.S. ElectionsTech, Cyber Companies Launch Security Standard to Monitor Hacking AttemptsThe Hacking of Starlink Terminals Has BegunGoogle’s Android Red Team Had a Full Pixel 6 Pwn Before LaunchLong-Awaited IoT Reverse Engineering Tool Finally HereKrebs: The Security Pros and Cons of Using Email AliasesMusk Teases X.com Social Media PlatformFacebook Profits From Ads on Searches for Hate Group PagesFormer Twitter Employee Found Guilty of Spying for Saudi ArabiaEU Court Expands Definition of Sensitive Data, Prompting Legal Concerns for CompaniesCisco Hacked by Yanluowang Ransomware Gang, 2.8GB Allegedly StolenMarymount Manhattan College (NY) Data Breach Following Unauthorized Access to NetworkZenith American Solutions (FL) Data Breach Impacts Sound Health and Wellness TrustAmerican Wholesale Furniture Company (IN) Announces Data BreachAutomotive Supplier Breached by 3 Ransomware Gangs in 2 Weeks7-Eleven Denmark Confirms Ransomware Attack Behind Store ClosuresConti Extortion Gangs Behind Surge of BazarCall Phishing AttacksDeathStalker’s VileRAT Continues to Target Foreign and Crypto Exchanges‘Tropical Scorpius’ Hacker Uses New RAT Malware in Cuba Ransomware AttacksPhishing Attack Abuses Microsoft Azure, Google Sites to Steal CryptoCISA Issues Warning on Active Exploitation of UnRAR Software for Linux SystemsCisco Fixes Bug Allowing RSA Private Key Theft on ASA, FTD DevicesKrebs: Microsoft Patch Tuesday, August 2022 EditionGoogle Now Blocks Workspace Account Hijacking Attempts Automatically Share this:TwitterFacebookWhatsAppRedditLinkedInEmailLike this:Like Loading... Published by The Cyber Beat View all posts by The Cyber Beat